Installation checklist
Follow the required steps below to complete the IBM® Storage Defender Sentinel anomaly scan software installation.
- Prerequisites - Portal access
- The License Owner or other authorized user has signed the End User License Agreement (EULA).
- Prerequisites - Host server
- Server is built that meets the requirements. For more information about requirements, see Server requirements and recommendations and ensure that the OS is updated.
- Drives are partitioned to meet requirements.
- Firewalls are either stopped/disabled OR configured.
- SELinux is disabled or permissive
- /etc/hostname configured with hostname.
- /etc/hosts is configured with long and short hostname added to local host 127.0.0.1.
- Optional – postfix or sendmail is active and enabled. Successful email verified from anomaly scan software server to intended domain.
- atop is installed, enabled, active and rotating properly.
- DNS or /etc/hosts is configured as needed.
- CLI access verified from your administration server (PC).
- Run CheckEngine.sh to confirm that above before proceeding.
- Prerequisites – Software
- Download/Install the IBM Storage Defender Sentinel anomaly scan software provided repositories.
- Download the IBM Storage Defender Sentinel anomaly scan software .tar file.
- Installation – Software
- Install the anomaly scan software – About 20 minutes.
- Verify all services are running.
- Configuration
- Log in to GUI - Record the manager Engine ID.
- Receive email with the license (.txt file).
- GUI – Upload the license.
- GUI - to add an index; then Select Index to select the index.
- GUI -
to make these selections:
Full Content, Map to Lowercase, CS Data Collection: Enabled, Synthetic Incremental: Enabled, Use Change Time for Incremental Indexing: Disabled
- GUI -
to set options.
Purge after 30 Days, Pause Yes, Policy Purge Deleted, Days to Keep 30
- GUI -
to add a merge job.
Yes, Yes, No, Do Not Pause, 2, 720 – Schedule as required after first full scan
- Validation
- Reboot the manager engine.
- Run CheckEngine.sh to confirm the configuration and that all anomaly scan software processes are running.
- Confirm that you can log into the anomaly scan software GUI.
- If email is supported, confirm that email was received by the expected recipients.